RussianPatents.com

User identification method

User identification method
IPC classes for russian patent User identification method (RU 2385233):

H04W12 - ELECTRIC COMMUNICATION TECHNIQUE
G07F19 - Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines (data processing equipment for bank accounting G06Q0040020000)
B42D15/10 - Identity, credit, cheque or like information-bearing cards (recognition of data, cards used as record carriers G06K; record carriers in general G11)
Another patents in same IPC classes:
Method and system for providing control information for supporting high-speed uplink and downlink Method and system for providing control information for supporting high-speed uplink and downlink / 2384983
Disclosed is a method and system for providing control information for supporting high-speed packet access downwards and high-speed packet access upwards. Unit B assigns at least one control downward channel and at least one upward channel for controlling the wireless transmission/reception unit (WTRU). The control downward channel and the control upward channel are provided for transmitting control information and for the downlink and uplink. Traditional control channels for the downward and upward directions are combined into a smaller set of control channels for the uplink and downlink. Unit B and the WTRU exchange control information over the control downward channel and the control upward channel. WTRU receives downlink data and transmits uplink data, and unit B receives uplink data and transmits downlink data based on control information transmitted over the downward control channel and the upward control channel.
Method and device for creating identification marks for wireless network Method and device for creating identification marks for wireless network / 2384982
Invention relates to a wireless communication device and a method of using the device. The wireless communication device can be used through providing access to information in memory, where the said information relates to a first communication network. Information with one or more reference signals from a second communication network is used to determine whether the wireless communication device is near the first communication network.
Methods and devices for providing internetworking of wireless wide area networks and wireless local area networks or wireless personal area networks Methods and devices for providing internetworking of wireless wide area networks and wireless local area networks or wireless personal area networks / 2384981
Embodiments describe methods, systems and devices which use position information to determine location of another device and/or to deliver a message based on location. The method can involve steps on which location information of a mobile device is received and an access point is used to transmit location information to one or more other devices which do not include functionalities for determining location which are interacting with the mobile device. The method can also involve a step where a message is sent to a mobile device at least partially based on the received available location information. In another version the method can involve steps on which user preference data are received from a mobile station or one or more other devices and transmission is handed over the mobile device or one or more other devices satisfying user preference data.
Method of providing notification for saving accumulator power in wireless communication system Method of providing notification for saving accumulator power in wireless communication system / 2384980
Invention relates to communication engineering. The method is realised between an access terminal (AT) and an access networks (AN) in a wireless communication system. The method involves sending (S41) a notification message to the AN, reception (S42) of a confirmation message from the AN and switching (S43) into power saving mode in accordance with a certain power saving mode. The notification message includes information on the life of the accumulator and a request for the power saving mode, and the confirmation message includes a certain power saving mode which is based on information on the life of the accumulator and the request for the power saving mode.
Method of controlling transmission power and mobile communication system Method of controlling transmission power and mobile communication system / 2384979
There is proposed a method of controlling transmission power in an enhanced relative grant channel (E-RGCH) for uplink user data transmitted from a cell controlled by a radio communication base station to a mobile station. The method involves the following steps on which: a radio network controller is used to specify at least one radio communication base station controlling the first cell and the second cell, the offset between the E-RGCH transmission power and the dedicated physical channel (DPCH) transmission power, when the mobile station is in the process of soft handover with the first and second cells; in the first cell, the transmission power of the first E-RGCH is determined based on the specified offset and the first E-RGCH is transmitted to the mobile station using a certain transmission power; in the second cell, the transmission power of the second E-RGCH is determined based on the specified offset and the second E-RGCH is transmitted to the mobile station using a certain transmission power.
Detuning protocols for wireless communication systems Detuning protocols for wireless communication systems / 2384978
Invention relates to communication systems. Systems and methods for processing components of a wireless signal for a mobile wireless broadband access service are proposed. The systems and methods involve determination of a protocol which determines whether a detuning component should be launched to determine an alternative wireless communication channel. One or more detuning parameters for the detuning component are determined. After that the process can automatically select an alternative wireless communication channel partially based on the detuning procedure and at least one of the detuning parametres.
Inter-frequency handover Inter-frequency handover / 2384977
Invention is related to wireless communication. The embodiments are described in the context of transparent inter-frequency handover in a wireless network. A method is presented, which involves transmission of information on the power of a pilot signal sector of an access network for at least one frequency element in a message defined in the active group control protocol. Information relating to at least another frequency element is received in a message defined in the active group control protocol. The method also involves a step for determining whether there is need for handover from one frequency element to another, and can also involve transparent handover to another frequency element.
Method and device for reconfiguration in wireless system Method and device for reconfiguration in wireless system / 2384976
Invention relates to wireless communication systems. In the proposed solution, one TFC (transport format combination) is selected and reserved exclusively for use during signalling. The TFC can contain only one transport channel and always uses the same size of CRC and transport block so as to unambiguously determine corresponding installations for signalling. By examining transmission of a return communication line in a wireless system and a special case of change of the size of TFCI (transport format combination identifier) due to reconfiguration of TFCS (transport format combination set), which also results in the need for switching to new dedicated basic physical subchannel (DBPSCH) whenever the network notices that the mobile station does not switch to the new DBPSCH, it concludes that the sent TFCS reconfiguration message was lost and remains with the existing configuration. Otherwise, a new configuration taken for use.
Method of canceling request for location information Method of canceling request for location information / 2384975
Invention relates to communication. Method for canceling request for location information is proposed, where if a location server which has received a request for information on location of a specific terminal from an external client cannot send the said external client information on location of this terminal, this location server can cancel the said request without a request for cancellation from the external client.
Base transceiver station on-board aircraft for mobile communication Base transceiver station on-board aircraft for mobile communication / 2384974
Invention relates to a base station (BTS) for a cellular communication system which has user equipment on board an aircraft at a predefined altitude, and a ground-based network. The BTS is made as an on-board BTS which has a screening device which generates a first signal (S1) matched for screening a second signal (S2) from the ground-based network at a predefined altitude. The on-board BTS also has a signal generator which generates a third signal (S3) which is more powerful than the first signal (S1) and the second signal (S2), and can set up a communication line with user equipment through the third signal (S3).
Method and device for user selection in multiple languages for system user interface Method and device for user selection in multiple languages for system user interface / 2374690
Terminal comprises processor, display, memory, reader of cards with data saved on portable memory carrier. Operator interface is displayed on screen in operator's language, customer interface is created by customer interface program and is performed by processor, customer interface is displayed in customer's language. Module of language identification is saved in memory and is performed by processor. Module of language identification is arranged with the possibility of operator's language and customer's language selection, which are displayed for operator and customer, accordingly. Languages of operator and customer are selected out of multiple languages saved in module. Languages of operator and customer differ.
Universal casino kiosk for cash, tickets and cards, with function of card emitting Universal casino kiosk for cash, tickets and cards, with function of card emitting / 2373578
Invention is related to self-service terminals. Casino kiosk is fit for money issue in response to acceptance and confirmation of authenticity of tickets inserted into device for reception of banknotes/tickets, for reading and confirmation of authenticity of cards inserted into device for reading/recording of cards, recording of data on card placed into device for reading/recording of cards or issued by device for card issue, issue of card for a client, which is given out by device of card issue, on which, for example data are recorded by device for reading/recording of cards.
Electronic cash adapter for automatic teller machine Electronic cash adapter for automatic teller machine / 2371771
Electronic cash adapter consists of casing side wall of which is provided with connectors for coinbox, bank note box, recycler, cash dispenser; and for connection of electronic cash adapter to automatic teller machine. At that, electronic cash adapter includes also MDB dispatcher of payment systems, virtual coinbox, emulating coinbox on MDB bus with capability of odd money distribution; virtual bank note box, emulating bank note box on MDB bus. Besides electronic cash adapter includes general dispatcher, which initialises system and generates summary information for cash dispenser to work out fiscal check, and cash dispenser control module generating queries for cash dispenser and decrypting queries from it. And also block of cash dispenser interfacing protocol; this block converts data from cash dispenser control module according to protocol RS-232 and transfers data to cash dispenser and MDB dispatcher of automatic teller machine, controlling queries from/to automatic teller machine.
Method and system for conducting transaction using proximity device Method and system for conducting transaction using proximity device / 2324979
Method for verification accompanying the process of conducting a transaction using a proximity device comprises the following steps: dynamically generating a first authentication value; transmitting the first authentication value from the proximity device to a terminal; including the first authentication value in a discretionary data field of message data, the message data being arranged in an ISO format; and transmitting the message data from said terminal to a verification device for verification.
Automatic banking machine for dispensing cash with improved card holding capabilities and method realized therein Automatic banking machine for dispensing cash with improved card holding capabilities and method realized therein / 2311683
Automatic teller machine includes body with protected storage for placement of devices for realization of transactions and card reading device, which has a bunker connected to it for storing cards intercepted by automatic teller machine. Users of automatic teller machine input and receive separate sheets or stacks of sheets through corresponding aperture in automatic teller machine, which sheets may be representing banknotes, checks and other documents. Banknotes received by the automatic teller machine and qualified as valid may be recycled and dispensed to other users. Banknotes evaluated as having doubtful validity, may be marked by removable marks and subjected to additional analysis. Checks, processed by automatic teller machine, may be scanned by image generation device, cancelled and stored in automatic teller machine or, alternatively, may be returned to user.
Automatic teller machine for giving out cash, and method for its operation Automatic teller machine for giving out cash, and method for its operation / 2310235
Automatic teller machine contains a chamber, connected to the frame, cash dispensing device, cash receiving device, container for containing deposits. Also automatic teller machine may contains a printer for printing receipts, device for reading cards. Face side of automatic teller machine may have replaceable panels with apertures for providing access to hardware devices. Also, method for operation of automatic teller machine and method for installing an automatic teller machine are claimed.
Device for dispensing money in automatic teller machine Device for dispensing money in automatic teller machine / 2309107
Automatic teller machine contains device for dispensing banknotes, having a clip containing money, device for taking banknotes, device for transporting banknotes and device for dispensing banknotes. Rotary door of the clip opens automatically during insertion of the clip into dispensing device. Taking device is made with possible intake of banknotes through an opening. Spring-loaded blade of cover wall holds the shaft of taking device in conjugating connection with driving pin. Transportation device is made with possible vertical and horizontal movement of banknotes. Transportation device contains transporter belts between intermediate shaft and driving shaft. The intermediate shaft is made with possible vertical movement relatively to the driving shaft to ensure stretching of transporter belt. Transportation device also has convex-conic rollers, which automatically repeatedly center the weakened transporter belt. The latch of dispensing device is installed at banknote dispensing port in automatic teller machine. The latch is opened by a lever connected to bar, in turn connected to latch. The latch is opened due to upward movement of the pin in a recess positioned at an angle.
Arrangement and a mode of detection of jamming of paper for an automatic bank machine Arrangement and a mode of detection of jamming of paper for an automatic bank machine / 2304810
Paper for printing the journal of an automatic bank machine is fed from a roll for feeding paper, the arrangement for winding paper receives paper from the printing arrangement, displacement of the arrangement for winding paper is identified by a detector connected with the electronic scheme having a processor. The signals of malfunction are formed by the electronic scheme in response to identification by the detector of the state characterizing jamming of the paper and breakage of the paper.
Automatic teller machine for dispensing money with devices for lighting user interface Automatic teller machine for dispensing money with devices for lighting user interface / 2304308
Automatic teller machine contains user interface. User interface contains a device for reading from cards, an opening for dispensing printed receipts, an opening for dispensing cash and an opening for receiving deposits. Near an appropriate place, where user interacts with certain device for realizing transaction functions, available on automatic teller machine, multicolor light-emitting devices, connected to that place, are positioned. One or more automatic teller machine controllers are selectively programmed for controlling color and duration of output radiation of each light-emitting device in response to program, connected to controller, and to working condition of appropriate device for realizing transaction functions.
Method, device and information carrier for confirming access right to autonomous resources Method, device and information carrier for confirming access right to autonomous resources / 2300142
Method includes changing identification information during each new query of autonomous resource, which information is used for identification of carrier during following queries to autonomous resources, by including it in algorithmically converted form on information carrier and in database of central device and checking of its correspondence in a row of previous queries to autonomous resources. Each autonomous resource has memory block for storing conversion algorithms and signs of these algorithms and block for reading/recording carrier information. Central device contains at appropriate data bank addresses the virtual memory blocks for storing information for identification of carriers and memory block for storing a set of algorithms for converting code from one type to another and signs of these algorithms, and for each carrier - information storage address which was used during previous accesses. Carrier contains energy-independent additional memory block for recording, storing and reading additional information code after identification of carrier, available both during manufacture of carrier and its submission to autonomous resource.
Protective element Protective element / 2381908
Protective element has at least one section on which there is a diffraction structure which, under defined viewing conditions, reconstructs a diffraction-optical image, and on which there is are subsections which do not take part in reconstruction of the diffraction-optical image and display visually distinguished information. The subsections and the diffraction structure surrounding them under conditions for viewing the protective element, where the diffraction structure does not reconstruct the diffraction-optical image, have identical or at least very similar reflection properties, which makes the information displayed by the subsections primarily visible only in the said defined conditions for viewing the diffraction-optical image.

FIELD: physics, computer engineering.

SUBSTANCE: method of identifying a user by using a PIN code involves assigning the user with a unique number for accessing an identification system. A PIN code table corresponding to the said unique number is created and the unique number and PIN code table are stored by both parties. PIN codes are read by the user from the table and the PIN code is sent to the identification system where the incoming PIN code is compared with the PIN code stored in the identification system with output of a control solution. Columns and rows of the table are assigned indices, with possibility of unambiguous determination of any cell of the PIN code table as a set of indices of intersecting elements of the table, where the indices are displayed in random order. A single character is randomly placed into each cell of the table. The user and the identification system assume the same order of reading characters from the PIN code table, beginning with the character indicated in given cell of the PIN code table. First, the user enters the identification system by entering the unique number and if such a unique number is available in the memory of the identification system, the identification system responds by randomly selecting a cell of the PIN code table and determines the set of indices of the elements of the table at whose intersection lies the cell and sends that set of indices to the user. The said user uses the set of indices on their copy of the PIN code table, finds the cell containing the first PIN code character and, using the received order of reading characters from the PIN code table, identifies the rest of the cells containing the rest of the PIN code characters. Further, the user enters the obtained PIN code or list of cells of the table containing PIN code characters into the identification system which compares the obtained PIN code with the PIN code obtained inside the identification system from the PIN code table stored in it in accordance with the received order of their reading. If the entered PIN code coincides with that obtained inside the identification system, the latter confirms successful user identification. If the entered PIN code does not coincide with that obtained inside the identification system, the latter carries out an action assigned by the corresponding program, e.g. switches on an alarm signal or blocks the user with the given unique number for a certain time.

EFFECT: increased security of the procedure of entering a PIN code owing to encoding, with easier manufacture of PIN cards.

5 cl, 1 dwg

 

The invention relates to a method for remote identification of the users of the automated payment networks using PIN codes.

A known method of identifying the user using the identification PIN code, including the formation of a payment card, which is applied to the nominal value, subject to debit the card until it is reset, the identification number to log in to the write-off amount, as well as do areas with drawing pins, each of which corresponds to a certain the amount to charge, covering the opaque easily deformable film or coating, deposited in the payment system of the individual number cards with a list of PIN codes and corresponding of amounts written off, while in the process of identifying remove the cover and read the PIN code, which corresponds to the fixed part of the value is the resolution on the cancellation of this fixed part of the data PIN and ID number the user enters in system identification, which it compares with the PIN code stored in a memory of the payment system, and with the concurrence of the entered PIN one identification system confirms the successful identification of the user, and if there is no match, the authentication system performs the action prescribed in the relevant program is Moi, for example includes alarm (FR, application 2747962, B42D 15/10, 1997).

The disadvantage of this solution is the size of a credit card depends on the number of sites and the size of fixed amounts under each PIN (with increase of the nominal dimensions of the card are greatly enhanced), which is inconvenient to the user, while increasing the size of the fixed amounts under each PIN with fewer stations, convenience card only shows up when making large cash purchases. Wasteful use of the surface of the small size of a credit card of this type prevents saturation of the sites with the proper number of pins, enough to produce as small payments, and large. In addition, the loss of the card requires a prompt cancellation, because the PIN code operation is routine and is not encoded.

There is also known a method of identifying the user using the identification PIN code, including assigning a user to an individual for access authorization and identification, generation of the table of the PIN corresponding to that individual number storage at both sides of the private rooms and tables PIN codes, read user PIN codes from the table, the transfer PIN in the identification system, comparing the received PIN code stored in the system ID is tificatio, with development control decisions (see EN 2183563, B42D 15/10, G07F 19/00, 2001). The method differs from the above mentioned fact that the map additionally supply the unique ID of the response of the payment system, placed in the same cell of the table is the PIN next to each of them, as before the procedure debit card, the user compares the received response code recorded in the cell with the entered PIN code. The method extends the solvency of the credit card and eliminates unauthorized write-off of amounts the system, not a credit structure that issued the card.

The disadvantage of this solution is realized using to send the PIN code from the user to the remote system channel with a low degree of protection. In this case, there is a significant probability of intercept PIN attackers. Gaining access to other people's PIN code allows you to access other people's personal records, correspondence, to make unauthorised transactions on behalf of or to paralyze business processes. This, in turn, leads to lower trust users to remote systems, creates fertile ground for computer crimes.

The objective of the invention is the provision of a higher degree of security procedures for entering the PIN code.

Technical result achieved when solving a task, expressed as the increase in the idenote procedure enter the PIN code when using open lines of communication through coding. In addition, simplifies the manufacture of the PIN card (there is no need to apply a protective coating).

To solve the task the user authentication method to use to identify the PIN code, including assigning a user to an individual for access authorization and identification, generation of the table of the PIN corresponding to that individual number storage at both sides of the private rooms and tables PIN codes, read user PIN codes from the table, the transfer PIN in the identification system, comparing the received PIN code stored in the identification system for generating a control solution, characterized in that the columns and lines of the table designated by numbers that uniquely identify each cell of the table PIN codes as a set of overlapping indexes of table entries, the index of the display in a random order, in addition, the table cells are placed randomly on one character, the user and the authentication system will accept the same procedure reads characters from a table, PIN-codes, which begin from the character specified in the specified cell of the table PIN first user by entering the individual is included in system identification, that if such individual is the real numbers in its memory in response randomly selects a cell of the table PIN and determines the set of indices of elements of the table at the intersection of which lies cell, and transmits the set of indexes to the user who is using them on his table instance PIN finds the cell that contains the first character of the PIN and, using the accepted procedure reads characters from the table the PIN identifies the remaining cells containing symbols PIN, then the PIN code or a list of cells table containing the symbols of the PIN, the user enters the identification system, which compares the received PIN with the PIN received within the identification system, stored in table PIN, in accordance with accepted order they are read, with the concurrence of the entered PIN is received within the identification system, the latter confirms the successful identification of the user, if not entered a PIN received within the identification system of the latter performs the action specified by the respective program, for example, includes alarm or blocking user with the given individual number for a certain time. In addition, the number of columns and rows in the table randomly and not less than 4. In addition, if for indexing one group of table items PIN-codes use letters, for indexing the second group of elements used numbers. In addition, use random paradisecasey alpha or numeric indices of the columns and rows of the grid PIN. In addition, the adopted procedure reads characters from a table PIN includes a number of input symbols and/or procedure reads characters from cells, for example, "top-down" or "right to left", etc.

Comparative analysis of the essential features of the proposed solution with essential features analogs and prototypes demonstrate compliance of the proposed technical solutions to the criterion "novelty".

While the signs of the distinctive part of the formula of the invention provides a solution to the following tasks.

The signs of the columns and lines of the table designated by numbers that uniquely identify each cell of the table PIN as a set of overlapping indexes of table elements" allow in process of transfer current PIN code, the user is not its real content, and the code indicating the indexes (characters)assigned to the intersecting rows and columns of the table PIN, thereby to determine the first character PIN code, which provides the first level of encryption. In addition, there is no opportunity for third parties to identify already "used" PIN-codes (which erased the protective coating).

Signs indicating that the index display in random order" exclude recovery table PIN-codes for "eavesdropping" multiple pin codes. Signs indicated Yausa, what in the cells of the table are placed randomly on one symbol, prevent the restoration of the contents of the table PIN when you try it "hacking" and, in addition, provide an opportunity for character formation of PIN-code, which when given order reading symbols from table PIN (for example, the transition from one cell of the table to another, or variations in the number of characters in the PIN code) provides an additional level of encryption. In addition, the same symbols table can repeatedly be read in the composition differing from each PIN that eliminates the protective opaque coating and increases the "capacity" of the table.

Signs of the user and the authentication system will accept the same procedure reads characters from a table, PIN-codes, which begin from the character specified in the specified cell of the table PIN" provide the possibility of multiple reading of the same characters from the table PIN in the composition differing from each PIN that provides an additional level of encryption.

The signs of the first user by entering the individual is included in the identification system, which in the presence of such individual numbers in its memory in response randomly selects a cell of the table PIN determines at what the PR index table entries, at the intersection of which lies cell, and transmits the set of indexes, the user provides the user receiving a coded indication of the actual PIN code for confirmation of the last access to the system identification.

Signs indicating that the user using the set of indexes on your table instance PIN, finds the cell that contains the first character of the PIN and, using the accepted procedure reads characters from a table PIN, reveals its cells containing symbols PIN" provide "restore the PIN code by the user according to encoded instructions for system identification.

Signs "then received a PIN code or a list of cells table containing the symbols of the PIN, the user enters the identification system, which compares the received PIN with the PIN received within the system identification, stored in the table PIN in accordance with the accepted order in which they read" provide the ability to identify the PIN code entered by the user, with the input of a list of cells of the table (i.e. the set of indices of the intersecting table elements forming these cells) also provides additional protection of the transmitted PIN code.

Signs "when matching the entered PIN-code with the received inside the system identification latter confirms the successful identification of the user, if not entered a PIN received within the identification system of the latter performs the action specified by the respective program, for example, includes alarm" describe the possible reaction system identification entered into the user PIN code.

Signs of the second paragraph of formula increase the "capacity" of the table by the number of pins and increase their security in case of loss of the latter.

The signs of the third claim of the invention increase the unambiguous decoding of the set of indexes.

The signs of the fourth claim of the invention increase the security table PIN-codes.

The signs of the fifth paragraph of the claims disclose the concept of "order of reading characters from a table PIN".

The drawing shows a variant of the table PIN.

The claimed method is implemented using the card, which is applied to the image table PIN 1, row 2 and columns 3 which are indicated by indexes 4 and 5, with the ability to uniquely identify each cell of the table PIN as a set of overlapping indexes of table elements, i.e. column 3 and row 2. For material used for foundations and external forms of this card is no different from any other card that contains the PIN codes. Fundamentally there is no limitation to use as material CT is s plastic, thick cardboard or metal plate (steel, aluminum, other alloys).

If the index 5 to index one group of table items PIN-codes (column 3) use letters as index 4 to index the second group of elements (rows 2) it is advisable to use mathematical symbols preferred numbers. Although you can use for these purposes alphabetical index (it is important that the letters are used to denote the rows that do not match the letters used to indicate the columns). The order, alphabetic or numeric indices of the columns and rows of the grid PIN is arbitrary, i.e. if we are talking about the letters, they are not in alphabetical order (for example, A, C, E, G, B, H, D, F...Y), if we are talking about numbers, they are not in ascending order or descending order (for example, 1, 3, 6, 2, 9, 7, 4, 5, 8, 0...X), here X and Y, the number of elements table PIN (columns and rows) is any integer greater than four. X and Y may be equal (table square), and not equal to each other (table rectangular). The alphabet, which are letters, or writing numbers can be anything, but be sure that they are clearly understandable to the user. In addition, the characters contained in the cells, must be entered when using a standard keyboard, a well-known com is cationic devices ensure the development of information packages used for remote exchange (transfer) of information appropriate for the purposes of the transfer PIN.

In the table cells are placed randomly on one character (letter or digit or otherwise). You can also use empty cells in the table. Reading order of the empty cells is determined by the adopted procedure reads characters from a table, PIN-codes, including the number of input symbols (3-10 etc) and "trajectory" move through the cells of the table that defines the sequence of "connections" character in the PIN. Reading symbols from table PIN start from the character specified in the specified cell of the table PIN. The following trails further movement of the table cells: left, right, up-down, up-right diagonal up-left diagonal down-right diagonal down-left diagonal. When the PIN code can be read out in a spiral to the right or left. It is advisable for each variant of the procedure read (path move through the cells of the table) be assigned a code number or letter, specifying the order of instructions in the information units exchanged between the user and the system identification. It is also advisable reading order can change with each session, identify the purpose.

Thus, depending on the specific procedure reads characters from a table PIN one and the same symbol of one cell can be used in the various pins on a card the size of a pocket calendar is placed not less than 2400 PIN codes.

The claimed method is implemented as follows.

The user contacts the organization, such as a credit, where it is assigned a unique number to access the system identification of the organization and issue a card with a picture of the table PIN corresponding to that individual number and order code reading. This information is passed to the memory identification system organization and stored over the period of use of the card, as well as data describing the table PIN. The user also stores individual card number, instance granted table PIN codes and procedure(s) reading tables PIN-codes.

When authentication is required, for example to access the payment system, the user enters in the system identify its individual number. The identification system searches its memory such individual number. In case of negative result of the search (no memory of such number) identification system terminates the interaction with the user, informing him of the error, and if the result is positive, p is the claim identification system prepares a request to the user arbitrarily selects a cell of the table PIN, containing the first character PIN, determines the set of indices of elements of the table, at the intersection of which lies the cell, and determines the order of reading the PIN code and the code of this procedure). Further, the identification system passes this set of indices (identifying the cell PIN code) and the code of procedure for reading the PIN code to the user. The user, using these data in their table instance PIN finds the cell that contains the first character of the PIN and, using accepted in this case, the procedure reads characters from a table PIN, reveals the rest of its cells containing symbols PIN. Then received a PIN code or a list of cells table containing the symbols of the PIN (it all depends on the adopted system Protocol and its interaction with the user), the user enters the identification system, which compares the received PIN code (or restored it passed by the user to the list of cells of the table) PIN received within the identification system, stored in its memory table PIN, in accordance with the decision taken in this case the order they are read. Further, when matching the entered PIN-code (or restored according to the data obtained from the user) are obtained within the identification system confirms the last successful user authentication. When nesovpaden and entered the PIN code (or restored according to received from the user) are obtained within the identification system performs the last action prescribed for her by a corresponding program, for example, includes alarm and/or stops the interaction with the user.

After a certain period of time or limit the number of transactions, and also wishes card containing a code table, replaced by a new one. This protects you from full disclosure of the content code table, even if attackers are able to intercept all used to this user PIN codes.

The new card to the user can be transmitted in the form of an image that is encrypted in a known manner (PGP and the like), from the operator system to the user personally or be sent by post in sealed form.

The present invention is industrially applicable as it does not require for its use of special technologies, except those that are currently used in the manufacture of, for example, plastic credit cards or pocket calendars.

1. The user authentication method to use to identify the PIN code, including assigning a user to an individual for access authorization and identification, formation table PIN corresponding to this private room is, storage at both sides of the private rooms and tables PIN codes, read user PIN codes from the table, the transfer PIN in the identification system, comparing the received PIN code stored in the identification system for generating a control solution, characterized in that the columns and lines of the table designated by numbers that uniquely identify each cell of the table PIN-codes, as the set of indexes of the intersecting elements of the table, the index of the display in a random order, in addition, the table cells are placed randomly on one character, the user and the authentication system will accept the same procedure reads characters from a table, PIN-codes, which begin from the character specified in the specified cell of the table PIN at the beginning of the user by entering the individual is included in the identification system, which in the presence of such individual numbers in its memory in response randomly selects a cell of the table PIN and determines the set of indices of elements of the table, at the intersection of which lies cell, and transmits the set of indexes to the user who is using them on his table instance PIN finds the cell that contains the first character of the PIN and, using accepted order reading symbols from table PIN to the s, identifies the remaining cells containing symbols PIN, then the PIN code or a list of cells table containing the symbols of the PIN, the user enters the identification system, which compares the received PIN with the PIN received within the system identification, stored in the table is the PIN in accordance with the order they are read when matching the entered PIN is received within the identification system, the latter confirms the successful identification of the user, if not entered a PIN received within the identification system performs the last action prescribed in the relevant the program, for example, includes alarm or blocking user with the given individual number for a certain time.

2. The method according to claim 1, characterized in that the number of columns and rows in the table randomly and not less than 4.

3. The method according to claim 1, characterized in that if for indexing one group of table items PIN-codes use letters, for indexing the second group of elements used a number.

4. The method according to claim 1, characterized in that use arbitrary order, alphabetic or numeric indices of the columns and rows of PIN-codes.

5. The method according to claim 1, characterized in that the adopted procedure reads characters from a table PIN Kodo, which includes the number of input symbols and/or reading symbols from its cells, carried out for any movement.

 

© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English.